grandeduc - Fotolia
I read that "super-sized" cookies can be used to complete distributed denial-of-service attacks. How can these types of cookies be detected and stopped from entering my network?
Most denial-of-service (DoS) attacks overwhelm the computing resources or bandwidth of a target system, focusing on the remote site. However, super-sized cookie DoS attacks are different; these types of attacks target a client system that is trying to access specific websites and causes an indirect DoS attack.
Two of the key tenets of computer security are to never trust input and always sanitize data received. This goes for data a server is receiving as well as data a client is receiving from a server.
While the malicious cookie data is being rejected by the server correctly, clients should limit the number of cookies being set on a client system by a webpage. Web browsers can be set to allow a website to only send a limited number of cookies and avoid this issue. In the blog, Calin also mentions that cookies could just be cleared in the browser to fix the issue.
Super-sized cookies can be detected a couple different ways, but might be easiest to detect over the network by monitoring HTTP traffic for larger-than-normal data being immediately sent to a Web server to set up a connection. Though it might be reasonable for a large amount of data to be entered into a Web application, it would be unusual for a large amount of data to be sent when setting up a connection.
A host-based intrusion detection system could also be used to identify a website that uses a large number of cookies. It can block the malicious cookies as well, or monitor for error messages from the server to alert that a system might be infected with malicious cookies.
Ask the Expert:
Want to ask Nick Lewis a question about enterprise threats? Submit your questions now via email. (All questions are anonymous.)
Don't miss SearchSecurity's DDoS defense Security School
Dig Deeper on DDoS attack detection and prevention
Related Q&A from Nick Lewis
Cloud penetration testing presents new challenges for information security teams. Here's how a playbook from the Cloud Security Alliance can help ... Continue Reading
Many cloud providers are tight-lipped about internal security control details. Learn how to evaluate cloud security providers with certifications and... Continue Reading
Enterprises new to the cloud can write new security policies from scratch, but others with broad cloud usage may need an update. Consider these ... Continue Reading